General

  • Target

    be34fd7c0dc0c8f938dfa37a03f5b12e93b70cbd5054f59a502188513a445db8.apk

  • Size

    3.0MB

  • Sample

    210728-kg75j3kbsx

  • MD5

    7f92e7dcd790f5331c5547e02031eaba

  • SHA1

    746f87d303de0763c287a2fa35cc1cb1d86473ef

  • SHA256

    be34fd7c0dc0c8f938dfa37a03f5b12e93b70cbd5054f59a502188513a445db8

  • SHA512

    e6de2a33214b2147c95f8b52b985665064d85854ad58fc2cd04ba6038ee43473f3ce4c5bc3e060123829b346df321c3f3e2e82b4b397b8f44b7facdbf4ba43cf

Malware Config

Targets

    • Target

      be34fd7c0dc0c8f938dfa37a03f5b12e93b70cbd5054f59a502188513a445db8.apk

    • Size

      3.0MB

    • MD5

      7f92e7dcd790f5331c5547e02031eaba

    • SHA1

      746f87d303de0763c287a2fa35cc1cb1d86473ef

    • SHA256

      be34fd7c0dc0c8f938dfa37a03f5b12e93b70cbd5054f59a502188513a445db8

    • SHA512

      e6de2a33214b2147c95f8b52b985665064d85854ad58fc2cd04ba6038ee43473f3ce4c5bc3e060123829b346df321c3f3e2e82b4b397b8f44b7facdbf4ba43cf

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks